Sciweavers

1412 search results - page 14 / 283
» The Value of Outsourced Software
Sort
View
ACNS
2010
Springer
114views Cryptology» more  ACNS 2010»
13 years 11 months ago
Two New Efficient PIR-Writing Protocols
Assume that a client outsources his database to a remote storage-provider (the server), so that for privacy reasons, the client's database is encrypted by his secret key. Duri...
Helger Lipmaa, Bingsheng Zhang
RE
2006
Springer
13 years 7 months ago
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling
In goal-oriented requirements engineering (GORE), one usually proceeds from a goal analysis to a requirements specification, usually of IT systems. In contrast, we consider the us...
Jaap Gordijn, Michaël Petit, Roel Wieringa
ISR
2010
13 years 6 months ago
Electronic Markets, Search Costs, and Firm Boundaries
We study how electronic markets that facilitate broader inter-firm transactions affect the vertical scope of emerging IT-enabled extended enterprises. We do so by modeling firms...
Ramesh Sankaranarayanan, Arun Sundararajan
ISPW
2006
IEEE
14 years 1 months ago
A Value-Based Software Process Framework
This paper presents a value-based software process framework that has been derived from the 4+1 theory of value-based software engineering (VBSE). The value-based process framework...
Barry W. Boehm, Apurva Jain
ISPW
2009
IEEE
14 years 2 months ago
Bridge the Gap between Software Test Process and Business Value: A Case Study
For a software project to succeed, acceptable quality must be achieved within an acceptable cost, providing business value to the customers, and keeping delivery time short. Softwa...
Qi Li, Mingshu Li, Ye Yang, Qing Wang, Thomas Tan,...